WebApp Sec mailing list archives

Pentesting attacks


From: ITlook <madziak12 () vp pl>
Date: Wed, 25 Jul 2012 05:00:51 -0700 (PDT)



- Zed Attack Proxy - see what it;s all about!
- Understand how A Wireless (802.11) Probe Request Based Attack works
- How to secure users from Phishing, Smishing & Social Media Attacks
- Cyber war... Is the digital apocalypse approaching?
- Original “security through obscurity" viz. SCADA penetration testing

Find it now in FREE issue of PenTest magazine!
http://pentestmag.com/pentesting-attacks-pentest-free/
-- 
View this message in context: http://old.nabble.com/Pentesting-attacks-tp34209974p34209974.html
Sent from the Web App Security mailing list archive at Nabble.com.




This list is sponsored by Cenzic
--------------------------------------
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenzic Website HealthCheck. FREE.
Request Yours Now!
http://www.cenzic.com/2009HClaunch_Securityfocus
--------------------------------------


Current thread: